Abstract is missing.
- On the Protection of Private Information in Machine Learning Systems: Two Recent ApprochesMartín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang 0001. 1-6 [doi]
- How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare GamesTiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley. 7-21 [doi]
- A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android ApplicationsStefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei. 22-36 [doi]
- Securing Concurrent Lazy Programs Against Information LeakageMarco Vassena, Joachim Breitner, Alejandro Russo. 37-52 [doi]
- Towards a Flow- and Path-Sensitive Information Flow AnalysisPeixuan Li, Danfeng Zhang. 53-67 [doi]
- Symbolic and Computational Mechanized Verification of the ARINC823 Avionic ProtocolsBruno Blanchet. 68-82 [doi]
- Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle ModelAlley Stoughton, Mayank Varia. 83-99 [doi]
- Formal Computational Unlinkability Proofs of RFID ProtocolsHubert Comon, Adrien Koutsos. 100-114 [doi]
- Rethinking Large-Scale ConsensusRafael Pass, Elaine Shi. 115-129 [doi]
- Formal Verification of Protocols Based on Short Authenticated StringsStéphanie Delaune, Steve Kremer, Ludovic Robin. 130-143 [doi]
- Secure Composition of PKIs with Public Key ProtocolsVincent Cheval, Véronique Cortier, Bogdan Warinschi. 144-158 [doi]
- Human Computing for Handling Strong Corruptions in Authenticated Key ExchangeAlexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval. 159-175 [doi]
- Run-Time Attack Detection in Cryptographic APIsRiccardo Focardi, Marco Squarcina. 176-188 [doi]
- The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security GuidelinesDaniel Fett, Ralf Küsters, Guido Schmitz. 189-202 [doi]
- Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and ApplicationsKevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan. 203-216 [doi]
- UC-Secure Non-interactive Public-Key EncryptionJan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin. 217-233 [doi]
- Symbolic Verification of Privacy-Type Properties for Security Protocols with XORDavid Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. 234-248 [doi]
- Differential Privacy in Quantum ComputationLi Zhou, Mingsheng Ying. 249-262 [doi]
- Rényi Differential PrivacyIlya Mironov. 263-275 [doi]
- PrivatePool: Privacy-Preserving RidesharingPer A. Hallgren, Claudio Orlandi, Andrei Sabelfeld. 276-291 [doi]
- Reconciling Privacy and Utility in Continuous-Time Diffusion NetworksMichael Backes 0001, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma. 292-304 [doi]
- Leakage-Minimal Design: Universality, Limitations, and ApplicationsM. H. R. Khouzani, Pasquale Malacaria. 305-317 [doi]
- Tight Bounds on Information Leakage from Repeated Independent RunsDavid M. Smith, Geoffrey Smith. 318-327 [doi]
- Synthesis of Adaptive Side-Channel AttacksQuoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan. 328-342 [doi]
- Securing Databases from Probabilistic InferenceMarco Guarnieri, Srdjan Marinovic, David A. Basin. 343-359 [doi]
- A Universally Composable Treatment of Network TimeRan Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia. 360-375 [doi]
- Types for Location and Data Security in Cloud EnvironmentsIvan Gazeau, Tom Chothia, Dominic Duggan. 376-391 [doi]
- Secure Compilation and Hyperproperty PreservationMarco Patrignani, Deepak Garg 0001. 392-404 [doi]
- Verified Translation Validation of Static AnalysesGilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu. 405-419 [doi]
- Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational InvariantsHyoukjun Kwon, William Harris, Hadi Esmaeilzadeh. 420-435 [doi]
- A Formal Approach to Cyber-Physical AttacksRuggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò 0001. 436-450 [doi]
- Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOLAndreas Viktor Hess, Sebastian Mödersheim. 451-463 [doi]
- Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded ProcessesEmanuele D'Osualdo, Luke Ong, Alwen Tiu. 464-480 [doi]
- SAT-Equiv: An Efficient Tool for Equivalence PropertiesVéronique Cortier, Antoine Dallon, Stéphanie Delaune. 481-494 [doi]